Refine
Departments, institutes and facilities
- Fachbereich Informatik (59)
- Fachbereich Angewandte Naturwissenschaften (32)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (32)
- Fachbereich Ingenieurwissenschaften und Kommunikation (25)
- Institut für Cyber Security & Privacy (ICSP) (20)
- Fachbereich Wirtschaftswissenschaften (17)
- Institut für funktionale Gen-Analytik (IFGA) (16)
- Institute of Visual Computing (IVC) (13)
- Institut für Verbraucherinformatik (IVI) (11)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
Document Type
- Conference Object (79)
- Article (70)
- Part of a Book (10)
- Conference Proceedings (3)
- Book (monograph, edited volume) (2)
- Doctoral Thesis (2)
- Bachelor Thesis (1)
- Contribution to a Periodical (1)
- Research Data (1)
- Master's Thesis (1)
Year of publication
- 2016 (174) (remove)
Language
- English (174) (remove)
Keywords
- Dielectric analysis (2)
- Fas (2)
- IEEE802.11 (2)
- Intelligent Transport System (2)
- Large, high-resolution displays (2)
- Lignin (2)
- Long-Distance WiFi (2)
- Numerical optimization (2)
- Single Instruction Multiple Data (SIMD) (2)
- SpMV (2)
- Sparse Matrix Vector multiply (SpMV) (2)
- User Experience (2)
- Vehicular Ad hoc Networks (2)
- WiLD (2)
- citizen participation (2)
- dielectric analysis (2)
- food systems (2)
- intrinsics (2)
- reaction kinetics (2)
- regional food production (2)
- social empirical research (2)
- sustainable transition (2)
- urban green spaces (2)
- 31P NMR (1)
- 3D user interface (1)
- 5-Oxoprolinase (1)
- 5-oxoprolinuria (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
- Access regulation (1)
- Actuators (1)
- Adaptive Media Streaming (1)
- Adaptive optics (1)
- Advanced Driver Assistance Systems (1)
- Africa (1)
- Age estimation (1)
- Agile software development (1)
- Aminoacylase 1 (1)
- Analytics (1)
- Antibiotics resistance (1)
- Aspartic acid racemization (1)
- Aspartoacylase (1)
- Autoimmune disease (1)
- Automation (1)
- Autonomy (1)
- B-cell lymphoma (1)
- BCL2 (1)
- Beech wood (1)
- Benchmarking (1)
- Biobased polymeric material (1)
- Biomass (1)
- Biometrics of chips (1)
- Blocking (1)
- Business Models (1)
- CD30+ cells (1)
- CIK cells (1)
- CIK-Zellen (1)
- CUDA (1)
- Camphorquinone (1)
- Canavan disease (1)
- Cannabinoids (1)
- Case study (1)
- Ceramic matrix composite (1)
- Chaetocin (1)
- Chemical resource (1)
- Code Generation (1)
- Collaboration and e-Services (1)
- Collaborative design (1)
- Compensation schemes (1)
- Consumer Online Behaviour (1)
- Cooperative Awareness Message (1)
- Corporate Social Responsibility (1)
- Country Risks (1)
- Crisis management (1)
- Culture (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Depth Of Cure (1)
- Destination marketing (1)
- Difference-coding (1)
- Dimethacrylate (1)
- Directional Antenna (1)
- Disclosive ethics (1)
- Distributed rendering (1)
- Domain-Specific Modeling Languages, (1)
- Drug resistance (1)
- Dystonia (1)
- E-Business (1)
- E-Learning (1)
- ELSI (1)
- EPHB2 (1)
- Elliptic Curve Cryptography (1)
- Elution (1)
- Embedded software (1)
- Empirical study (1)
- Endosomes (1)
- Enterprise Engineering (1)
- Enterprise Information Systems (1)
- Enterprise Resource Planning (1)
- Entlohnungssysteme (1)
- Epithelial-mesenchymal transition (1)
- Ethnographic Research (1)
- Evaluation (1)
- Exergame (1)
- Exergames (1)
- Experiment (1)
- FGR (1)
- FOXA1 (1)
- Factory instrumentation (1)
- Failure analysis (1)
- Fall prevention (1)
- Fault analysis (1)
- Fault-channel watermarks (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Filler content (1)
- Fog (1)
- Force (1)
- Force field (1)
- Fourier-transform infrared spectroscopy (1)
- Framing (1)
- Free space optics (1)
- Friction (1)
- GC/MS (1)
- GPU (1)
- Game design (1)
- Gas chromatography/mass spectrometry (GC/MS) (1)
- Glutathione synthetase (1)
- Gradient-boosting (1)
- Grasping (1)
- HDAC inhibitor (1)
- HEB mixer (1)
- HPC (1)
- Hand Tracking (1)
- Heart Rate Prediction (1)
- High-performance computing (1)
- Histograms (1)
- ICT (1)
- IP protection (1)
- ISM: kinematics and dynamics (1)
- ISM: molecules (1)
- Industrial applications (1)
- Industry 4.0 (1)
- Instance-based learning (1)
- Integral backstepping technique (1)
- Intel Xeon Phi (1)
- Interaction (1)
- Internationalization (1)
- Ion viscosity (1)
- Irradiance Distribution (1)
- Issue tracking systems (1)
- Java (1)
- KNN (1)
- Kinetics (1)
- LEF1 (1)
- Language Engineering (1)
- Laser-Beam Profiler (1)
- Lattice Boltzmann (1)
- Light Curing Units (1)
- Lighting simulation (1)
- Linear quadratic regulator (1)
- Linear regression (1)
- Liquid-liquid extraction (LLE) (1)
- Living Lab (1)
- Longley-Rice (1)
- Lymphoproliferative disorder (1)
- Lysosomes (1)
- Lügenverhalten (1)
- MAC (1)
- MAPO (1)
- MPV17 monoclonal antibody (1)
- MYB (1)
- Machine Learning (1)
- Manipulation tasks (1)
- Market segmentation (1)
- Membrane protein (1)
- Method of lines (1)
- Method validation (1)
- Methodology (1)
- Mining Software Repositories (1)
- Mitochondria (1)
- Mitochondrial DNA depletion syndrome (1)
- Mobile robotics (1)
- Model Fitting (1)
- Model-Driven Engineering (1)
- Model-free control (1)
- Modular software packages (1)
- Molecular dynamics (1)
- Molecular modeling (1)
- Motion Capture (1)
- Movement disorder (1)
- Multi-drug efflux (1)
- Multiphase flow (1)
- Musical Performance (1)
- N-acylated amino acids (1)
- NFKB (1)
- Na+/K+ ATPase (1)
- Natural Language Processing (1)
- Navigation interface (1)
- Network simulation (1)
- Nonlinear control quadrotor uav (1)
- Nvidia graphic processors (1)
- OSGi (1)
- Object detection (1)
- Object recognition (1)
- Older adults (1)
- Open-source (1)
- OpenACC (1)
- OpenFlow (1)
- OpenMP (1)
- OpenMP, unrolling (1)
- Organosolv (1)
- Organosolv process (1)
- Outer membrane channel (1)
- Performance (1)
- Performance Simulation (1)
- Performance prediction (1)
- Peroxisomes (1)
- Photoinitiator (1)
- Photopolymerization (1)
- Poly(acrylonitrile-co-1,3-butadiene-co-styrene)/polyamide 6 (ABS/PA 6) blends (1)
- Predictive Models (1)
- Privacy (1)
- Propagation (1)
- Pseudonym Concept (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- Pyroglutamic aciduria (1)
- Pyrolysis (1)
- Pyrolysis-GC/FID (1)
- Pyrolysis-GC/MS (1)
- Pyrolysis–GC/MS (1)
- Q measurement (1)
- QPSK (1)
- Qualitative study (1)
- Quantification (1)
- RCE (1)
- ROW methods (1)
- Receivers (1)
- Resin based composite (1)
- Resin composite (1)
- Rheology (1)
- Risk Analysis (1)
- River alarm systems (1)
- RoboCup industrial (1)
- Robotics (1)
- Robustness (1)
- Rule-based production systems (1)
- SAHA (1)
- SDN (1)
- SDWN (1)
- SGN-35 (1)
- SOS calls (1)
- Sandbox (1)
- ScalarMultiplication (1)
- Scanning electron microscopy (SEM) (1)
- Scenarios (1)
- Sclera (1)
- Security APIs (1)
- Self-driving (1)
- Serbian tourism (1)
- Service Design (1)
- Shan-Chen model (1)
- Shear viscosity (1)
- Side Channel Countermeasures (1)
- Silicon biometrics (1)
- Single Lens Reflex Camera (1)
- Size effect (1)
- Smart factory (1)
- Software Feature Request Detection (1)
- Software Security (1)
- Sparse Matrix Vector Multiplication (1)
- Spurious velocity (1)
- Strategic Planning (1)
- Strong Physical Unclonable Functions (PUFs) (1)
- Sustainability (1)
- Symmetry detector (1)
- Targeting (1)
- Technology acceptance (1)
- Text detection (1)
- Text recognition (1)
- Token (1)
- Tourist behavior (1)
- Traceability (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transcriptional enhancer (1)
- Trapped radicals (1)
- Two-Ray (1)
- Ubiquity (1)
- Unconjugated THC-COOH (1)
- Unity (1)
- Usability (1)
- Usable Security (1)
- User centered design (1)
- User feedback (1)
- VR (1)
- Vector Intrinsics (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicle-to-Vehicle Communication (1)
- Visible light curing resin (1)
- WDS (1)
- Water supply networks (1)
- Water supply systems (1)
- Watermarking (1)
- Web (1)
- Web Content Analysis (1)
- Web Mining (1)
- WebSocket (1)
- Weibull (1)
- WiFi (1)
- Wicked Problems (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- X-ray photoelectron spectroscopy (1)
- Zambia (1)
- Zielvorgaben (1)
- Zytokin-induzierte Killerzellen (1)
- agriculture (1)
- airway (1)
- antibody deficiency (1)
- antibody–drug conjugate (1)
- apoptosis (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- autonomous sensor system (1)
- autophagy (1)
- bass-shaker (1)
- biomolecules (1)
- breast cancer (1)
- brute force methods (1)
- chaetocin (1)
- clear cell renal cell carcinoma (1)
- collaboration (1)
- computer-supported collaborative work (1)
- conceptual culture model (1)
- conditioned media (1)
- confocal fluorescence microscopy (1)
- coverage (1)
- crisis exercise (1)
- cryogenics (1)
- cuSPARSE (1)
- curing behavior (1)
- cytokine-induced killer (CIK) cells (1)
- cytokine-induced killer cells (1)
- design science research (1)
- developing countries (1)
- dielektrická analýza (1)
- distribuce záření (1)
- emergency response (1)
- energy harvesting (1)
- engage exchange model (1)
- epithelial sodium channels (1)
- erp4students (1)
- failure criterion (1)
- fall prevention (1)
- fall risk (1)
- far-infrared astronomy (1)
- flame tube (1)
- force sensing (1)
- fotokompozit (1)
- gaming (1)
- gasotransmitter (1)
- generator (1)
- goals (1)
- hardness testing (1)
- heat-transfer method (1)
- heterodyne (1)
- human-centric lighting (1)
- hydrogen sulfide (1)
- hypoxia (1)
- iPad (1)
- immunodeficiency (1)
- individual differences (1)
- individuelle Unterschiede (1)
- instrumentation: spectrographs (1)
- investment casting (1)
- ion viscosity (1)
- kinetika vytvrzování (1)
- klarzelliges Nierenzellkarzinom (1)
- leaning (1)
- light distribution (1)
- long-term study (1)
- low-income country (1)
- lying (1)
- lymphoma (1)
- mesenchymal stem cells (1)
- micro-benchmarks (1)
- mobile computing (1)
- molecule-surface interactions (1)
- mood (1)
- nanocrystalline diamond (1)
- neuro-cognitive performance (1)
- older adults (1)
- optimization of telecommunications systems (1)
- outbreak management (1)
- pensions (1)
- peripheral vision (1)
- photo-polymerization (1)
- physical activity (1)
- political economy (1)
- prefrontal cortex (1)
- qualitative research (1)
- resin for 3D-printing (1)
- risk communication (1)
- robots (1)
- run-time adaptation (1)
- rural areas (1)
- self-assembled monolayers (1)
- sensor fusion (1)
- server processors (1)
- short-term memory (1)
- single-nucleotide polymorphisms in DNA (1)
- slip detection (1)
- social media analysis (1)
- socio economic impact (1)
- spectral rendering (1)
- stars: formation (1)
- structure prediction (1)
- submillimeter-wave technology (1)
- superconducting devices (1)
- surface textures (1)
- surfaces (1)
- synthetic sapphire (1)
- tactile sensing (1)
- teams (1)
- techniques: spectroscopic (1)
- territoriality (1)
- thermogravimetric analysis (1)
- thread mapping (1)
- tvrdost (1)
- unrolling (1)
- validity (1)
- vector units (1)
- vibration (1)
- vibration energy (1)
- viscoelastic properties (1)
- visibility (1)
- visible light curing resin based composites (1)
- viskoelastické vlastnosti (1)
- vytvrzování světlem (1)
- wavelength (1)
- weakest link (1)
- whole-body interface (1)
- wireless communication (1)
- wmSDN (1)
- workday breaks (1)
- workspace awareness (1)
- γ-glutamyl cycle (1)
Recent years have seen extensive adoption of domain generation algorithms (DGA) by modern botnets. The main goal is to generate a large number of domain names and then use a small subset for actual C&C communication. This makes DGAs very compelling for botmasters to harden the infrastructure of their botnets and make it resilient to blacklisting and attacks such as takedown efforts. While early DGAs were used as a backup communication mechanism, several new botnets use them as their primary communication method, making it extremely important to study DGAs in detail.
In this paper, we perform a comprehensive measurement study of the DGA landscape by analyzing 43 DGAbased malware families and variants. We also present a taxonomy for DGAs and use it to characterize and compare the properties of the studied families. By reimplementing the algorithms, we pre-compute all possible domains they generate, covering the majority of known and active DGAs. Then, we study the registration status of over 18 million DGA domains and show that corresponding malware families and related campaigns can be reliably identified by pre-computing future DGA domains. We also give insights into botmasters’ strategies regarding domain registration and identify several pitfalls in previous takedown efforts of DGA-based botnets. We will share the dataset for future research and will also provide a web service to check domains for potential DGA identity.
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Doubting - Path to Science
(2016)
The analysis of Δ9-tetrahydrocannabinol (THC) and its metabolites 11-hydroxy-Δ9-tetrahydrocannabinol (11-OH-THC), and 11-nor-9-carboxy-Δ9-tetrahydrocannabinol (THC-COOH) from blood serum is a routine task in forensic toxicology laboratories. For examination of consumption habits, the concentration of the phase I metabolite THC-COOH is used. Recommendations for interpretation of analysis values in medical-psychological assessments (regranting of driver’s licenses, Germany) include threshold values for the free, unconjugated THC-COOH. Using a fully automated two-step liquid-liquid extraction, THC, 11-OH-THC, and free, unconjugated THC-COOH were extracted from blood serum, silylated with N-methyl-N-(trimethylsilyl) trifluoroacetamide (MSTFA), and analyzed by GC/MS. The automation was carried out by an x-y-z sample robot equipped with modules for shaking, centrifugation, and solvent evaporation. This method was based on a previously developed manual sample preparation method. Validation guidelines of the Society of Toxicological and Forensic Chemistry (GTFCh) were fulfilled for both methods, at which the focus of this article is the automated one. Limits of detection and quantification for THC were 0.3 and 0.6 μg/L, for 11-OH-THC were 0.1 and 0.8 μg/L, and for THC-COOH were 0.3 and 1.1 μg/L, when extracting only 0.5 mL of blood serum. Therefore, the required limit of quantification for THC of 1 μg/L in driving under the influence of cannabis cases in Germany (and other countries) can be reached and the method can be employed in that context. Real and external control samples were analyzed, and a round robin test was passed successfully. To date, the method is employed in the Institute of Legal Medicine in Giessen, Germany, in daily routine. Automation helps in avoiding errors during sample preparation and reduces the workload of the laboratory personnel. Due to its flexibility, the analysis system can be employed for other liquid-liquid extractions as well. To the best of our knowledge, this is the first publication on a comprehensively automated classical liquid-liquid extraction workflow in the field of forensic toxicological analysis.
The development of advanced robotic systems is challenging as expertise from multiple domains needs to be integrated conceptually and technically. Model-driven engineering promises an efficient and flexible approach for developing robotics applications that copes with this challenge. Domain-specific modeling allows to describe robotics concerns with concepts and notations closer to the respective problem domain. This raises the level of abstraction and results in models that are easier to understand and validate. Furthermore, model-driven engineering allows to increase the level of automation, e.g. through code generation, and to bridge the gap between modeling and implementation. The anticipated results are improved efficiency and quality of the robotics systems engineering process. Within this contribution, we survey the available literature on domain-specific modeling and languages that target core robotics concerns. In total 137 publications were identified that comply with a set of defined criteria, which we consider essential for contributions in this field. With the presented survey, we provide an overview on the state-of-the-art of domain-specific modeling approaches in robotics. The surveyed publications are investigated from the perspective of users and developers of model-based approaches in robotics along a set of quantitative and qualitative research questions. The presented quantitative analysis clearly indicates the rising popularity of applying domain-specific modeling approaches to robotics in the academic community. Beyond this statistical analysis, we map the selected publications to a defined set of robotics subdomains and typical development phases in robotic systems engineering as reference for potential users. Furthermore, we analyze these contributions from a language engineering viewpoint and discuss aspects such as the methods and tools used for their implementation as well as their documentation status, platform integration, typical use cases and the evaluation strategies used for validation of the proposed approaches. Finally, we conclude with recommendations for discussion in the model-driven engineering and robotics community based on the insights gained in this survey.
The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR 2016), held between November 13-17, 2016 - Barcelona, Spain, continued the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies and applications.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
The design of future materials for biotechnological applications via deposition of molecules on surfaces will require not only exquisite control of the deposition procedure, but of equal importance will be our ability to predict the shapes and stability of individual molecules on various surfaces. Furthermore, one will need to be able to predict the structure patterns generated during the self-organization of whole layers of (bio)molecules on the surface. In this review, we present an overview over the current state of the art regarding the prediction and clarification of structures of biomolecules on surfaces using theoretical and computational methods.
Cognitive robotics aims at understanding biological processes, though it has also the potential to improve future robotics systems. Here we show how a biologically inspired model of motor control with neural fields can be augmented with additional components such that it is able to solve a basic robotics task, that of obstacle avoidance. While obstacle avoidance is a well researched area, the focus here is on the extensibility of a biologically inspired framework. This work demonstrates how easily the biological inspired system can be used to adapt to new tasks. This flexibility is thought to be a major hallmark of biological agents.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.
We propose an artificial slime mould model (ASMM) inspired by the plasmodium of Physarum polucephalum (P. polucephalum). ASMM consists of plural slimes, and each slime shares energy via a tube with neighboring slimes. Outer slimes sense their environment and conform to it. Outer slimes periodically transmit information about their surrounding environment via a contraction wave to inner slimes. Thus, ASMM shows how slimes can sense a better environment even if that environment is not adjacent to the slimes. The slimes subsequently can move in the direction of an attractant.